Skip to main content

From DSS to MILS

(Extended Abstract)

  • Chapter
Book cover Dependable and Historic Computing

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6875))

Abstract

I outline the principal ideas of the Distributed Secure System (DSS) on which Brian Randell and I collaborated in the early 1980s, its modern manifestation as MILS, and continuing research challenges posed by these architectures.

This work was supported by National Science Foundation Grant CNS-0720908.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Randell, B., Rushby, J.: Distributed secure systems: Then and now. In: Proceedings of the Twenty-Third Annual Computer Security Applications Conference, Miami Beach, FL, pp. 177–198. IEEE Computer Society, Los Alamitos (2007) Invited “Classic Paper” presentation

    Chapter  Google Scholar 

  2. Brownbridge, D.R., Marshall, L.F., Randell, B.: The Newcastle Connection, or UNIXes of the world unite! Software—Practice and Experience 12, 1147–1162 (1982)

    Article  Google Scholar 

  3. Boettcher, C., DeLong, R., Rushby, J., Sifre, W.: The MILS component integration approach to secure information sharing. In: 27th AIAA/IEEE Digital Avionics Systems Conference, St. Paul, MN, The Institute of Electrical and Electronics Engineers (2008)

    Google Scholar 

  4. Rushby, J.: The design and verification of secure systems. In: Eighth ACM Symposium on Operating System Principles, Asilomar, CA, pp. 12–21 (1981); ACM Operating Systems Review 15(5)

    Google Scholar 

  5. Rushby, J.: Noninterference, transitivity, and channel-control security policies. Technical Report SRI-CSL-92-2, Computer Science Laboratory, SRI International, Menlo Park, CA (1992)

    Google Scholar 

  6. Haigh, J.T., Young, W.D.: Extending the noninterference version of MLS for SAT. IEEE Transactions on Software Engineering SE-13, 141–150 (1987)

    Article  Google Scholar 

  7. van der Meyden, R.: What, Indeed, is Intransitive Noninterference (Extended Abstract). In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 235–250. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Chong, S., van der Meyden, R.: Using architecture to reason about information security. Technical report, University of New South Wales (2009)

    Google Scholar 

  9. Dobson, J., Randell, B.: Building reliable secure computing systems out of unreliable insecure components. In: Proceedings of the Seventeenth Annual Computer Security Applications Conference, New Orleans, LA, pp. 162–173. IEEE Computer Society, Los Alamitos (2001) Invited “Classic Paper” presentation

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Rushby, J. (2011). From DSS to MILS. In: Jones, C.B., Lloyd, J.L. (eds) Dependable and Historic Computing. Lecture Notes in Computer Science, vol 6875. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24541-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24541-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24540-4

  • Online ISBN: 978-3-642-24541-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics